CN105391674B - Information processing method and system, server and client - Google Patents

Information processing method and system, server and client Download PDF

Info

Publication number
CN105391674B
CN105391674B CN201410453286.9A CN201410453286A CN105391674B CN 105391674 B CN105391674 B CN 105391674B CN 201410453286 A CN201410453286 A CN 201410453286A CN 105391674 B CN105391674 B CN 105391674B
Authority
CN
China
Prior art keywords
information
url address
website
server
judgment result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410453286.9A
Other languages
Chinese (zh)
Other versions
CN105391674A (en
Inventor
符永涛
李乐乐
陶思南
王志龙
邵荣杰
刘世川
罗谚君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410453286.9A priority Critical patent/CN105391674B/en
Publication of CN105391674A publication Critical patent/CN105391674A/en
Application granted granted Critical
Publication of CN105391674B publication Critical patent/CN105391674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an information processing method, which comprises the following steps: the server acquires a first URL address, wherein the first URL address is obtained by scanning a bar code by a client interacting with the server; the server judges the safety of the first URL address to obtain a first judgment result; the server acquires the outline information and the website type of the website linked by the first URL address; and the server sends the first judgment result, the synopsis information and the website type to the client. The invention also discloses an information processing system, a server and a client.

Description

Information processing method and system, server and client
Technical Field
The present invention relates to electronic technologies, and in particular, to an information processing method and system, a server, and a client.
Background
The bar code technology is a new technology which is developed on the basis of computer technology and information technology and integrates coding, printing, identification, data acquisition and processing. The barcode printed on the package of the commodity is usually seen by people as a one-dimensional barcode, which is limited by the information capacity, and the one-dimensional barcode only identifies the commodity but does not delineate the commodity. Therefore, the use of one-dimensional barcodes needs to rely on the existence of a database. The use of one-dimensional barcodes is greatly limited where there is no database and inconvenient networking. In addition, the one-dimensional bar code can hardly represent Chinese character information, so that the one-dimensional bar code is not enough in occasions with Chinese characters, and the efficiency is very low.
With the development of modern high and new technology, bar codes are urgently required to represent more information in a limited geometric space, so that the requirement of ever-changing information is met. Two-dimensional bar codes were created to solve the problem that one-dimensional bar codes could not solve. Two-Dimensional Code (Two Dimensional Code) is rapidly becoming popular and applied as a new generation of graphic Code technology due to its fast and convenient reading mode, rich character support and high capacity. According to the difference of the realization principle and the structure shape, the two-dimensional code can be divided into a matrix type two-dimensional code and a row type two-dimensional code, wherein,
the encoding principle of the row-type two-dimensional code is based on a one-dimensional bar code and is a code system which is piled up into two or more rows according to needs. The method inherits the characteristics of the one-dimensional bar code in the aspects of coding design, checking principle, reading mode and the like, and the bar code printing of the reading equipment is compatible with the one-dimensional bar code. However, due to the increase of the number of rows, the algorithm and software for identifying and decoding the rows are not completely the same as the one-dimensional bar code. A representative row-by-row two-dimensional code includes: PDF417, Code49, Code16K, etc. The row-type two-dimensional code is also called a two-dimensional bar code, and the two-dimensional bar code is a black-white alternate pattern which is distributed on a plane (two-dimensional direction) according to a certain rule by adopting a specific geometric pattern; the two-dimensional bar code is widely applied to commodity identification, for example, imported food is pasted with the two-dimensional bar code on the outer package of the food, and a logistics and supply chain management system based on the two-dimensional bar code can be established through the two-dimensional bar code, so that the food has an electronic identity card, and the food safety tracing management can be carried out.
The matrix type two-dimensional code is composed of a matrix form. Binary "1" is represented by the presence of a point (square, dot or other shape) at the position of the corresponding element of the matrix, binary "0" is represented by the absence of a point, and the arrangement and combination of the points determine the meaning represented by the matrix. Matrix two-dimensional code is a new pattern symbol automatic reading processing code system based on computer image processing technology, combined coding principle, etc. A representative matrix code includes: a Quick Response (QR) Code, an information Matrix (DM) Code, a Code one Code, a Maxi Code, and the like.
The QR code is illustrated in fig. 1-1, which is a square printed pattern visually formed by arranging a plurality of small blocks organized according to character information. The square area is also called a data area of the QR code, and is formed by arranging data module images (generally, black or white small squares in the data area). The upper right corner, the upper left corner and the lower left corner of the data area are provided with positioning images which are arranged by the data module images and used for positioning the data area. The data module image constituting the positioning image may also be referred to as a positioning module image, and the data module corresponding to the positioning module image may also be referred to as a positioning data module. The QR code has different versions according to the size of the capacity of the data area, and as shown in fig. 1-2, the versions of the QR code include 40 versions from version 1 to version 40, where the most version 1 is the smallest version, version 1 contains 21 × 21 data module images, and version 40 is the largest version, and version 40 contains 177 × 177 data module images. The larger the version of the QR code, the larger the data capacity of the corresponding QR code, and the larger the print size thereof.
In a browser in a current terminal, if a user needs to access a web page through the browser, the user needs to firstly master an address or a name of the web page, secondly, input a corresponding website in a corresponding window in the browser provided in the mobile terminal, and then, the browser accesses the corresponding web page according to the input website. However, in the above process of accessing a web page, a user needs to manually input a corresponding website, and when the user forgets or does not know the website of the web page, the efficiency of the user accessing the web page through a browser of the mobile terminal is very low, but the two-dimensional code technology overcomes the above problems, and a method based on a two-dimensional code terminal reading service exists in the related art: after the related information is coded to generate the two-dimensional code, firstly, a photographing function of the terminal is utilized to obtain the two-dimensional code symbol, then, decoding of the two-dimensional code symbol is completed through decoding application software in the terminal, and finally, the information contained in the two-dimensional code is processed through the application software, and corresponding service is provided for a terminal user. The method provides a way for a terminal user to quickly acquire information, and the application scene of the method comprises the following steps:
1. business card application
The user makes Personal name card information into a two-dimensional code through Personal Computer (PC) client software or a related website, and prints the two-dimensional code on the name card. After business cards are exchanged in business activities, a party receiving the business cards collects two-dimensional code symbols by using a mobile phone with a two-dimensional code recognition function, recognizes business card information in the two-dimensional code symbols, and displays the business card information on the mobile phone. The user can store the business card content in the address book of the mobile phone according to the requirement, can synchronize the business card content to the personal information management server for storage and the like, and can also make a call and send Email to the other party and the like.
2. Business marketing application
The operator or the value added service provider can release the information (such as enterprise site, content URL, customer service telephone, service publicity information, etc.) related to the own service to a website, a magazine or various flat media, and after the user reads the information through the terminal with the two-dimensional code reading function, the user can manually select to complete the operations of information browsing, service ordering, content downloading, such as downloading an application installation package, etc.
3. Voting
Many programs have a link of voting participation of audiences, a program provider can publish information related to the program on a website, a magazine or various flat media, and a user inputs certain content in a terminal after reading the information through the terminal with a two-dimensional code reading function and then sends the certain content to a certain specific number in a short message mode.
Based on the wide application field, scanning the two-dimensional code becomes a mobile internet entrance which is familiar and popular to users, and the users can conveniently surf the internet without inputting a long website by scanning the two-dimensional code. However, the existing two-dimension code scanning only provides original information of the two-dimension code or only scans the two-dimension code of a specific platform, and the safety is poor. That is to say, when a user scans a two-dimensional code, the user often cannot predict what content the scanned two-dimensional code is associated with, and therefore cannot confirm whether the scanned two-dimensional code is safe and whether the scanned two-dimensional code is desired by the user, and cannot guarantee that the user can safely access a Uniform Resource Locator (URL) corresponding to the two-dimensional code, and also cannot resist the attack of a malicious two-dimensional code.
Disclosure of Invention
In view of this, embodiments of the present invention provide an information processing method and system, a server, and a client for solving the problems existing in the prior art, and solve the problem that a user cannot quickly obtain the real two-dimensional code content when scanning a two-dimensional code.
The technical scheme of the embodiment of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an information processing method, where the method includes:
the server acquires a first URL address;
the server judges the safety of the first URL address to obtain a first judgment result;
the server acquires the outline information and the website type of the website linked by the first URL address;
and the server sends the first judgment result, the synopsis information and the website type to the client.
In a second aspect, an embodiment of the present invention provides an information processing method, where the method includes:
the server acquires a first URL address;
the server captures a second application installation package based on the first URL address, wherein the second application installation package is the installation package associated with the bar code;
the server judges the security of the second application installation package to obtain a first judgment result;
the server acquires the application type and the application summary information of the second installation package;
and the server sends the first judgment result, the application type of the second installation package and the application summary information to the client.
In a third aspect, an embodiment of the present invention provides an information processing method, where the method includes:
the client detects a first operation of a user;
the client judges whether the first operation is a bar code scanning operation or not to obtain a second judgment result;
when the second judgment result shows that the first operation is a bar code scanning operation, the client responds to the first operation and sends a first instruction to the image acquisition unit, and the first instruction is used for triggering the image acquisition unit to start to scan the bar code;
the client receives image information of a scanned bar code sent by the image acquisition unit, analyzes the image information to obtain a first URL address, and the first URL address is an address associated with the bar code;
the client sends the first URL address to a server;
the client receives a first judgment result, website synopsis information and a website type which are sent by a server, and outputs the first judgment result, the synopsis information and the website type to a user.
In a fourth aspect, an embodiment of the present invention provides an information processing method, where the method includes:
the client detects a first operation of a user;
the client judges whether the first operation is a bar code scanning operation or not to obtain a second judgment result;
when the second judgment result shows that the first operation is a bar code scanning operation, the client responds to the first operation and sends a first instruction to the image acquisition unit, and the first instruction is used for triggering the image acquisition unit to start to scan the bar code;
the client receives image information of a scanned bar code sent by the image acquisition unit, analyzes the image information to obtain a first URL address, and the first URL address is an address associated with the bar code;
the client sends the first URL address to a server;
the server receives the first URL address of the client;
the server judges the safety of the first URL address to obtain a first judgment result;
the server acquires the outline information and the website type of the website linked by the first URL address;
the server sends the first judgment result, the synopsis information and the website type to the client;
the client receives a first judgment result, website synopsis information and a website type which are sent by a server, and outputs the first judgment result, the synopsis information and the website type to a user.
In a fifth aspect, an embodiment of the present invention provides a server, where the server includes a first obtaining unit, a first determining unit, a second obtaining unit, and a first sending unit, where:
the first acquisition unit is used for acquiring a first URL (uniform resource locator) address, wherein the first URL address is obtained by scanning a bar code by a client;
the first judging unit is used for judging the safety of the first URL address to obtain a first judging result;
the second acquiring unit is configured to acquire the summary information and the website type of the website linked to the first URL address;
and the first sending unit is used for sending the first judgment result, the synopsis information and the website type to the client.
In a sixth aspect, an embodiment of the present invention provides a server, where the server includes a first obtaining unit, a fetching unit, a first determining unit, a second obtaining unit, and a first sending unit, where:
the first acquisition unit is used for acquiring a first URL (uniform resource locator) address, wherein the first URL address is obtained by scanning a bar code by a client;
the capturing unit is used for capturing a second application installation package based on the first URL address, wherein the second application installation package is an installation package associated with the bar code;
the first judging unit is used for judging the security of the second application installation package to obtain a first judging result;
the second obtaining unit is configured to obtain an application type and application summary information of the second installation package;
the first sending unit is configured to send the first determination result, the application type of the second installation package, and the application profile information to the client.
A seventh aspect of the present invention provides a client, where the client includes a detection unit, a second determination unit, a second sending unit, a first receiving unit, an analysis unit, a third sending unit, and a second receiving unit, where:
the detection unit is used for detecting a first operation of a user;
the second judging unit is used for judging whether the first operation is a bar code scanning operation or not to obtain a second judging result;
the second sending unit is configured to send a first instruction to the image acquisition unit in response to the first operation when the second determination result indicates that the first operation is a barcode scanning operation, where the first instruction is used to trigger the image acquisition unit to start to scan a barcode;
the first receiving unit is used for receiving the image information of the scanned bar code sent by the image acquisition unit;
the analysis unit is used for analyzing the image information to obtain a first URL address, and the first URL address is an address associated with the bar code;
the third sending unit is used for sending the first URL address to a server;
the second receiving unit is configured to receive the first determination result, the website profile information, and the website type sent by the server, and output the first determination result, the profile information, and the website type to the user.
In an eighth aspect, an embodiment of the present invention provides an information processing system, where the system includes a server and a client, where the client includes a detection unit, a second determination unit, a second sending unit, a first receiving unit, an analysis unit, a third sending unit, and a second receiving unit, and the server includes a first obtaining unit, a first determination unit, a second obtaining unit, and a first sending unit, where:
the detection unit is used for detecting a first operation of a user;
the second judging unit is used for judging whether the first operation is a bar code scanning operation or not to obtain a second judging result;
the second sending unit is configured to send a first instruction to the image acquisition unit in response to the first operation when the second determination result indicates that the first operation is a barcode scanning operation, where the first instruction is used to trigger the image acquisition unit to start to scan a barcode;
the first receiving unit is used for receiving the image information of the scanned bar code sent by the image acquisition unit;
the analysis unit is used for analyzing the image information to obtain a first URL address, and the first URL address is an address associated with the bar code;
the third sending unit is configured to send the first URL address;
the first acquisition unit is used for receiving the first URL address;
the first judging unit is used for judging the safety of the first URL address to obtain a first judging result;
the second acquiring unit is configured to acquire the summary information and the website type of the website linked to the first URL address;
the first sending unit is used for sending the first judgment result, the synopsis information and the website type;
and the third receiving unit is used for receiving the first judgment result, the website synopsis information and the website type and outputting the first judgment result, the synopsis information and the website type to a user.
The information processing method and system, the server and the client provided by the embodiment of the invention are characterized in that the server acquires a first URL address, wherein the first URL address is obtained by scanning a bar code by the client interacting with the server; the server judges the safety of the first URL address to obtain a first judgment result; the server acquires the outline information and the website type of the website linked by the first URL address; the server sends the first judgment result, the synopsis information and the website type to the client; therefore, the problem that the user cannot quickly know the real content of the two-dimensional code when scanning the two-dimensional code is solved.
Drawings
FIG. 1-1 is a schematic diagram of a QR code;
FIGS. 1-2 are schematic diagrams of different versions of a QR code;
fig. 1-3 are schematic diagrams illustrating a flow chart of an information processing method according to an embodiment of the present invention;
FIG. 2-1 is a schematic flow chart of an implementation of a second information processing method according to an embodiment of the present invention;
fig. 2-2 is a schematic diagram illustrating a relationship between a first URL address, a cloud searching and killing record, and a first determination result according to a second embodiment of the present invention;
FIG. 3-1 is a schematic view of an implementation flow of a third information processing method according to an embodiment of the present invention;
fig. 3-2 is a schematic structural diagram of an information resource processing module according to a third embodiment of the present invention;
FIG. 3-3 is a schematic diagram of the structure of the address analysis module shown in FIG. 3-2;
FIG. 3-4 is a schematic diagram of the virus killing engine shown in FIG. 3-2;
3-5 are schematic flow diagrams illustrating a third embodiment of the present invention, when the information resource processing module shown in FIGS. 3-2 to 3-4 is used to process the first URL address;
FIG. 4 is a schematic diagram of a flow chart of a fourth information processing method according to an embodiment of the present invention;
FIG. 5-1 is a schematic flow chart of an implementation of a fifth information processing method according to an embodiment of the present invention;
FIG. 5-2 is a first schematic interface diagram of a client end displayed to a user according to a fifth embodiment of the present invention;
5-3 are schematic diagrams of a second interface displayed to the client of the user according to the fifth embodiment of the present invention;
FIG. 6 is a schematic diagram of a component structure of a seventh server according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of a component structure of an eight-server according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of a nine-server configuration according to an embodiment of the present invention;
FIG. 9 is a schematic diagram of a component structure of a ten-server according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an eleventh exemplary embodiment of a client;
fig. 11 is a schematic diagram of a configuration of a twelve information processing system according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further elaborated below with reference to the drawings and the specific embodiments.
Example one
An embodiment of the present invention provides an information processing method, and fig. 1 to 3 are schematic diagrams illustrating an implementation flow of an information processing method according to an embodiment of the present invention, as shown in fig. 1 to 3, the method includes:
step 101, the server obtains a first Uniform Resource Locator (URL) address;
here, the first URL address is a URL address obtained by scanning a barcode by the client;
here, the server obtains the first URL address, which includes the following ways:
the first mode is as follows: the server receives a first URL address sent by a client;
the second mode is as follows: the server receives the image information sent by the client, analyzes the image information and obtains a first URL address.
Here, the client refers to a software application program (hereinafter referred to as an application) installed on the terminal by a user, the application at least can call a camera on the terminal, after the camera is started, the barcode is shot to obtain image information, and the application can obtain a URL address associated with the barcode according to the image information.
It should be noted that, a general application does not have the capability of analyzing image information, and needs to send the image information to a server, where the server may be a server of an application provider, and the server receives the image information, analyzes the received image information to obtain a URL address (i.e., a first URL address) associated with a barcode, and then sends the first URL address to a client. If the application has the capability of image information, the application directly parses the image information to obtain the first URL address. In any way, the client obtains the first URL address, in step 101, the first URL address may be sent to the server, so that the server obtains the first URL address (i.e. the first way described above).
As described above, the general application does not have the capability of analyzing the image information, and needs to transmit the image information to the server, and the server receives the image information and obtains the first URL address by analyzing the image information (i.e., the second method described above).
Here, the first URL address is a URL address obtained by scanning a barcode by the client; wherein, the bar code includes one-dimensional bar code and two-dimensional code, wherein the two-dimensional code includes matrix two-dimensional code and row formula two-dimensional code, and row formula two-dimensional code includes: PDF417, Code49, Code16K, etc., and the matrix includes QR Code, DM Code, Code one Code, Maxi Code, etc. The URL is a concise representation of the location and access method of resources available from the Internet, and is the address of a standard resource on the Internet; each file on the internet has a unique URL that contains information indicating the location of the file and how the browser should handle it.
Here, as can be seen from step 101, the barcode in step 101 is a URL barcode, the URL barcode is a barcode accessing a URL link generated by a barcode technology, and the terminal may scan the barcode to obtain image information, obtain URL information associated with the barcode by analyzing the image information, and access the URL website. When the bar code is a URL two-dimensional code, the URL link two-dimensional code is accessed through the two-dimensional code technology, the terminal obtains image information through scanning the two-dimensional code, and the URL website associated with the two-dimensional code is obtained through analyzing the image information.
Here, when the barcode is a matrix-type two-dimensional code, the image information is a binary number "1" or "0" represented by a corresponding element on the two-dimensional code; when the bar code is a one-dimensional bar code or a row-by-row two-dimensional bar code, the graph information is mark information consisting of bar codes, spaces and corresponding characters, wherein the bars refer to parts with lower light reflectivity, the spaces refer to parts with higher light reflectivity, and data consisting of the bars and the spaces express certain information and can be read by specific equipment and converted into binary and decimal information compatible with a computer.
102, the server judges the safety of the first URL address to obtain a first judgment result;
here, the security includes both a secure case and an insecure case, and the first determination result includes a first determination result that the first URL is secure and a first determination result that the first URL is insecure based on the interpretation of the security.
103, the server acquires the summary information and the website type of the website linked by the first URL address;
here, the general information includes information such as a Website icon (Website icon), a Website name, a Website profile, a security level, and risk details; the website types comprise social websites, government departments websites, transaction websites, enterprise websites, portal websites, interactive game websites, functional websites, office websites, personal websites and the like, wherein the enterprise websites are websites created by enterprises for displaying products of enterprises and the like, the portal websites refer to comprehensive websites with wide related fields, such as internet businesses, sports, news and the like, for example, internet surfing, green waves, search foxes and vacation, and the functional websites refer to websites providing some functions for the public, such as the official website of Google, the official website of hundred degrees (baidu), the website (www.12306.com) for buying the train tickets and the like.
And 104, the server sends the first judgment result, the synopsis information and the website type to the client.
In the embodiment of the present invention, there is no strict precedence relationship between step 102 and step 103, and step 102 may be executed first, and then step 103 may be executed, or step 103 may be executed first, and then step 102 may be executed.
It should be noted that the first URL address in step 101 in the embodiment of the present invention may be a first URL address sent by the client to the server, and the first URL address obtained by the client may be obtained by a sharing or using method, for example, the client obtains the first URL address by a sharing URL link in a social network.
In the embodiment of the invention, the server acquires a first URL address, wherein the first URL address is obtained by scanning a bar code by a client interacting with the server; the server judges the safety of the first URL address to obtain a first judgment result; the server acquires the outline information and the website type of the website linked by the first URL address; and the server sends the first judgment result, the synopsis information and the website type to the client, so that the problem that a user cannot quickly know the real two-dimensional code content when scanning the two-dimensional code is solved.
Example two
Based on the foregoing first embodiment, an information processing method is provided in an embodiment of the present invention, and fig. 2-1 is a schematic flow chart illustrating an implementation of a second information processing method in an embodiment of the present invention, as shown in fig. 2-1, the method includes:
step 201, the server acquires a first URL address;
here, the first URL address is a URL address obtained by scanning a barcode by the client;
step 202, the server judges whether a preset first record records the first URL address, and obtains a second judgment result;
here, the first record may be a black and white list, where the black and white list is a historical cloud killing record, and the cloud killing record includes a URL address, and the synopsis information and the website type of the URL.
Step 203, when the second judgment result indicates that the first URL address is recorded in the first record, the server obtains a first judgment result from the first record;
step 204, the server acquires the summary information and website type of the website linked by the first URL address from the first record;
step 205, the server sends the first determination result, the synopsis information, and the website type to the client.
As shown in fig. 2-2, when the server acquires the first URL address, it is determined whether the cloud killing record has the first URL address, and if so, the server acquires the first determination result, and the summary information and the website type of the website linked to the first URL address from the first record.
In the embodiment of the present invention, the method further includes: when the second judgment result shows that the first URL address is not recorded in the first record, sending a third prompt message to a client, wherein the third prompt message is used for showing that the first URL address is being killed, and asking a user to wait; generally, when the first determination result cannot be directly obtained, the process of triggering the killing by the background server generally lasts for several seconds or even ten seconds, so that the user is required to wait.
Of course, the above process may also be: when the second judgment result shows that the first URL address is not recorded in the first record, sending a first prompt message to a client, wherein the first prompt message is used for showing that the first URL address is unknown; then the client side sends a second prompt message to the user, wherein the second prompt message is used for inquiring whether the user wants to continuously access the first URL address, and when the user selects yes, the client side accesses the first URL address; and when the user selects no, the client exits.
The technical scheme provided by the embodiment of the invention can be used in the following scenes: the first user sees a two-dimensional code Y2 at a certain place Y1, then opens an application Y3 to scan the two-dimensional code Y2, finds that the two-dimensional code Y2 is associated with a URL address Y4 through analysis, then sends the URL address Y4 to the server through the client, and the server finds that the URL address Y4 is a trusted website after a double searching and killing process, and records the URL address Y4, the summary information of the URL address Y4 and the corresponding website type on a cloud searching and killing record. After a period of time, the second user sees a two-dimensional code Y2 at a place Y1, then opens an application Y5 to scan the two-dimensional code Y2, finds that the two-dimensional code Y2 is associated with a URL address Y4 through analysis, then sends the URL address Y4 to the server through the client, and after the server receives the URL address Y4, finds that the URL address Y4 is recorded in a historical cloud killing record, the server directly obtains a first judgment result about the URL address from the historical cloud killing record.
EXAMPLE III
Based on the first embodiment, an information processing method is provided in an embodiment of the present invention, and fig. 3-1 is a schematic flow chart of an implementation of a third information processing method in an embodiment of the present invention, as shown in fig. 3-1, the method includes:
step 301, the server acquires a first URL address;
here, the first URL address is a URL address obtained by scanning a barcode by the client;
step 302, the server determines whether a preset first record records the first URL address, and obtains a second determination result;
step 303, when the second judgment result indicates that the first URL address is not recorded in the first record, the server accesses the first URL address and captures a first information resource;
here, the first information resource is an information resource at the first URL address;
here, the server grabs a first information resource, including: the server calls the web crawler cluster, and the server sends the first URL address to the web crawler cluster; the web crawler cluster receives the first URL address, then captures information resources (namely first information resources) on the first URL address, and then sends the captured first information resources to the server.
The web crawler is a program for automatically extracting web pages, downloads web pages from the internet for a search engine, and is an important component of the search engine. The crawler obtains the URL on the initial webpage from the URL of one or a plurality of initial webpages, continuously extracts new URLs from the current webpage in the process of capturing the webpage, puts the new URLs into a queue and continues to analyze, and the process is repeated until the whole Internet is traversed and the later meets a certain stop condition of the system.
Step 304, the server judges the security of the first information resource to obtain a third judgment result, and the third judgment result is used as a first judgment result;
step 305, the server acquires the summary information and website type of the website linked by the first URL address from the first information resource;
step 306, the server sends the first determination result, the synopsis information and the website type to the client.
The web crawler cluster captures a first information resource according to a first URL (uniform resource locator) website sent by a server, wherein the first information resource comprises a document, an installation package, an embedded URL (uniform resource locator) address, a picture, an executable file, page content of a website and the like, and the document comprises a pdf document, a Word document, an excel document and a txt document; the embedded URL address comprises a URL address of a hyperlink; the installation package refers to an installation package of an application.
The embodiment of the invention provides an information resource processing module, wherein the structure schematic diagram of the information resource processing module is shown in fig. 3-2, the information resource processing module comprises a virus checking and killing engine, an application black and white list, a website virus scanning cluster and a website analysis module, wherein a document, an installation package and an executable file can enter the virus scanning engine to scan, the installation package can also enter the application black and white list to process, an embedded URL address, a picture and page content of a website can enter the website analysis module to process, and an embedded URL address can also enter the website virus scanning cluster to process. Here, the black and white list of applications may be a list of applications obtained from a trusted application store or web address, for example, a list of applications may be obtained from the android (android) electronic market, the application store of millet, the application store of apple, pea pod, and the like.
The structure of the website analysis module is shown in fig. 3-3, the website analysis scanning module includes a sample exchange interface, a sample such as embedded URL address, picture, and website page content is received from the web crawler cluster or the server from the sample exchange interface, and then the sample is placed in a website cloud identification center, the website cloud identification center can compare the similarity between the embedded URL address on the first URL address, the picture, the website page content, and other samples and other URL addresses except the first URL address, and when the similarity between the first URL address and other websites is greater than the preset similarity, the first URL address is unsafe; and when the similarity between the first URL address and other websites is less than or equal to the preset similarity, the first URL address is safe.
The website analysis scanning module also comprises a user feedback interface which is used for receiving complaints and feedback of users of the social platform to malicious websites and avoiding that websites of the users are mistakenly reported, and the website analysis scanning module also comprises an anti-false-report center which is used for protecting the websites from being mistakenly reported and mistakenly killed, wherein the anti-false-report center is provided with a white list, the white list is a safe website; and if not, continuously judging whether the website fed back by the user is on the blacklist, if so, not writing the relevant information of the website fed back into the blacklist, and if not, writing the relevant information of the website fed back into the blacklist. Here, the related information of the website includes a URL website, synopsis information of the website, and a website type;
the website analysis scanning module also comprises a list collection center which is used for searching various types of credible and incredible website types and sending the searched websites to a manual operation analysis center which is used for taking charge of operation, manual audit judgment and the like of a system website library, and when the websites are credible, the manual operation analysis center writes the related information of the websites into a white list; and when the website is not credible, the manual operation analysis center writes the related information of the website into a blacklist.
The website analysis scanning module also comprises an inquiry service interface which is used for inquiring an entrance for the website analysis scanning module; the query request received by the query service interface is processed through a website clustering/domain name screening trust degree model, then the query request is subjected to clustering/periodic regression and the like and then input to a website cloud identification center.
In the embodiment of the present invention, whether the first URL address is safe may be determined according to the similarity: for users, whether the website is safe or not comprises three categories, wherein the first category is that the website is unsafe because the website comprises viruses, and the viruses mainly refer to trojans and the like; while the second category of websites are insecure because the websites are phishing websites and the users are cheated, the third category of websites are insecure because the websites themselves are gambling websites and the like. When the first-class website is checked and killed by viruses, whether the first-class website is safe or not can be judged according to whether the viruses exist or not, namely if the viruses are checked and killed, the website is considered to be unsafe, and a first judgment result that the first URL address is unsafe is obtained; if the virus is not detected and killed, the website can be considered to be safe, and a first judgment result of the safety of the first URL address is obtained; in fact, more precisely, if the virus is not detected and killed, the website is considered to be possibly safe, and it is further required to verify whether the first URL website is safe through similarity. Generally, for the second type of website and the third type of website, there is no virus when the virus is detected and killed, but the first determination result that the website is safe cannot be obtained because the virus is not detected and killed.
The above-mentioned virus searching and killing engine is composed of the structure shown in fig. 3-4, and the virus searching and killing engine includes a sample receiving interface, the sample receiving interface receives samples such as documents, installation packages, executable files and the like from a web crawler cluster or a server, and then the samples such as the documents, the installation packages, the executable files and the like are respectively input into the virus cloud searching and killing engine and the virus characteristic engine, wherein the virus cloud searching and killing engine is used for matching and searching and killing the samples in a sample cloud library; and the virus characteristic engine is used for matching and killing the characteristics of the sample in the behavior cloud library. The virus checking and killing engine further comprises an auditing operation center which is used for being responsible for the operation of the sample cloud library and the literary cloud library.
Based on the foregoing fig. 3-2, fig. 3-3, and fig. 3-4, an embodiment of the present invention provides a flow of processing a first URL address based on the information resource processing module shown in the foregoing fig. 3-2 to fig. 3-4, where as shown in fig. 3-5, the flow includes:
step 351, the server acquires a first URL address;
step 352, the server judges whether a cloud searching and killing record records the first URL address, if yes, the step 353 is executed; if not, go to step 354;
step 353, the server returns information corresponding to the bar code;
here, the step 353 specifically includes: and the server acquires information corresponding to the bar code from the total cloud searching and killing record and returns the information to the client. The information corresponding to the bar code comprises a first judgment result, the outline information of the website linked by the first URL address and the website type; the first judgment result is the result of whether the first URL address is safe.
Step 354, the web crawler cluster captures a first information resource;
specifically, the server calls a web crawler cluster, the web crawler cluster captures a first information resource according to the first URL address, and the first information resource is an information resource on the first URL address.
Step 355, judging whether the first information resource comprises an installation package, if so, entering step 356, and if not, entering step 358;
step 356, the server invokes the virus killing engine;
step 357, the server queries the black and white list of the application;
here, step 357 further includes writing the corresponding information of the barcode into the cloud killing record.
Step 358, the server calls a website virus scanning cluster;
step 359, the server invokes the web site analysis module,
here, step 359 further includes writing the corresponding information of the barcode into the cloud killing record.
Specifically, step 355 to step 359 are described below, and in step 355, the server classifies the first information resource and performs different processing on the first information resource according to different classifications of the first information resource. The categories of the first information resource mainly include: documents, installation packages, embedded URL addresses, pictures, executable files, page content of websites, and the like;
processing the first information resource differently according to different categories of the first information resource, for example, invoking a virus killing engine for a document, an installation package, and an executable file (step 356); the installation package is an important object associated with the barcode, and therefore, it may be first determined whether the first information resource includes the installation package, the installation package is subjected to virus killing, and besides, a black and white list of an application may also be queried (step 357), and then results of step 356 and step 357 are integrated to obtain information corresponding to the barcode, and the information is returned to the client (step 353).
The first information resource is processed differently according to different categories of the first information resource, for example, the embedded URL address, the picture and the page content of the website can enter a website analysis module to be processed (step 358), the embedded URL address can also enter a website virus scanning cluster to be processed (step 359), and then the results of the step 358 and the step 359 are integrated to obtain information corresponding to the barcode, and the information is returned to the client (step 353).
Based on the information resource processing module shown in fig. 3-2, the step 304 includes:
step C11, the server calls a preset virus scanning module, and sends the first information resource to the virus scanning module, and the virus scanning module is used for scanning information resources for viruses;
here, the virus scanning module is the virus killing engine in fig. 3-2.
Step C12, the server receives the security result of the first information resource returned by the virus scanning module, and takes the security result of the first information resource as a third determination result.
Based on the information resource processing module shown in fig. 3-2, the step 304 includes:
step C21, the server calls a preset website analysis module, and sends the first information resource to a website analysis module, wherein the website analysis module is used for comparing the similarity of the first information resource with information resources on other websites;
here, the website analysis module in the step C21 may be the website analysis module shown in fig. 3-2.
Step C22, the server receives the similarity information returned by the website analysis module;
and step C23, the server judges the security of the first information resource according to the similarity information and a preset similarity threshold value, and obtains a third judgment result.
The server judges the security of the first information resource according to the size relationship between the similarity information and a preset similarity threshold value to obtain a third judgment result, and the method comprises the following steps:
step C231, the server determines a size relationship between the similarity information and the similarity threshold;
and step C232, when the similarity information is larger than the similarity threshold, obtaining a third judgment result that the first information resource is unsafe.
The server judges the security of the first information resource according to the size relationship between the similarity information and a preset similarity threshold value to obtain a third judgment result, and the method comprises the following steps:
step C231, the server determines a size relationship between the similarity information and the similarity threshold;
and step C233, when the similarity information is less than or equal to the similarity threshold, obtaining a third judgment result of the security of the first information resource.
In this embodiment of the present invention, when the information resource includes a first application installation package, the server determines the security of the first information resource to obtain a third determination result, further including:
step C41, judging the security of the first application installation package to obtain a fourth judgment result;
step C42, the server acquires the application type and the application summary information of the first installation package;
and step C43, the server uses the fourth determination result, the application type of the first installation package, and the application summary information as a third determination result.
Here, the step C41 includes:
step C411, the server analyzes the first application installation package to obtain ID information of the first application installation package;
step C412, judging whether a preset second record records the ID information of the first application installation package, and obtaining a second judgment result;
here, the second record may be a blacklist record of the application shown in fig. 3-2.
Step C413, when the second determination result indicates that the ID information of the first application installation package is recorded in the second record, the server obtains the fourth determination result from the second record;
correspondingly, the step C42 includes: and the server acquires the application type and the application summary information of the first installation package from the second record.
The embodiment of the invention has the main advantages that the processing capability and the integration capability of the cloud end are realized, and the website crawler cluster, the virus scanning engine, the website analysis module and the black and white lists of the application are integrated on the cloud end server, so that the two-dimensional code scanning one-stop service is realized.
Example four
Generally, a barcode is associated with a URL address (i.e. a first URL website), and information resources associated with the first URL address can be divided into two categories, where the first category is only an installation package, and the second category includes richer contents, which generally include page contents, pictures, advertisements, documents, and the like; the barcode associated with the installation package in the first category is generally intended to allow a user to download the installation package for installing an Application (APP), and the website associated with the second category is generally used to display some information, such as an official website of an enterprise, or a shopping website, etc., it should be noted that the installation package may also be included in the second category of the information resource classification in the first URL address, the above-mentioned second category is specifically described in the first to third embodiments, and the following specifically describes a case where only the installation package is associated with the first URL address. An embodiment of the present invention provides an information processing method, and fig. 4 is a schematic flow chart illustrating an implementation of a fourth information processing method according to an embodiment of the present invention, as shown in fig. 4, the method includes:
step 401, the server acquires a first URL address;
here, the first URL address is a URL address obtained by scanning a barcode by a client;
step 402, the server captures a second application installation package based on the first URL address;
here, the second application installation package is an installation package associated with the barcode;
step 403, the server determines the security of the second application installation package to obtain a first determination result;
step 404, the server acquires the application type and the application summary information of the second installation package;
step 405, the server sends the first determination result, the application type of the second installation package, and the application profile information to the client.
In this embodiment of the present invention, the step 403 includes:
step D11, the server analyzes the second application installation package to obtain the ID information of the second application installation package;
step D12, judging whether a preset second record records the ID information of the second application installation package, and obtaining a second judgment result;
here, the second record may be a blacklist record of the application shown in fig. 3-2.
Step D13, when the second determination result indicates that the ID information of the second application installation package is recorded in the second record, the server obtains the first determination result from the second record;
correspondingly, step 403 comprises: and the server acquires the application type and the application summary information of the second installation package from the second record.
Here, the step 403 includes:
in this embodiment of the present invention, the step 403 includes:
the server calls a preset virus scanning module and sends the second installation package to the virus scanning module, and the virus scanning module is used for scanning information resources for viruses;
and the server receives the security result of the second installation package returned by the virus scanning module, and takes the security result of the first information resource as a first judgment result.
Here, the virus scanning module is the virus killing engine in fig. 3-2.
EXAMPLE five
Based on the first to fourth embodiments, an information processing method is provided in an embodiment of the present invention and applied to a client, and fig. 5-1 is a schematic flow chart illustrating an implementation of a fifth information processing method in an embodiment of the present invention, as shown in fig. 5-1, the method includes:
step 501, a client detects a first operation of a user;
here, the first operation is any operation of the terminal by the user;
step 502, the client judges whether the first operation is a bar code scanning operation, and a second judgment result is obtained;
the bar code includes one-dimensional bar code and two-dimensional code, wherein the two-dimensional code includes matrix two-dimensional code and row formula two-dimensional code, and row formula two-dimensional code includes: PDF417, Code49, Code16K, etc., and the matrix includes QR Code, DM Code, Codeone Code, Maxi Code, etc.
Step 503, when the second judgment result indicates that the first operation is a barcode scanning operation, the client responds to the first operation and sends a first instruction to an image acquisition unit;
here, the first instruction is used for triggering the image acquisition unit to start to scan the bar code;
step 504, the client receives the image information of the scanned bar code sent by the image acquisition unit, and analyzes the image information to obtain a first URL address;
here, the first URL address is an address associated with the barcode;
step 505, the client sends the first URL address to a server;
step 506, the client receives the first determination result, the website profile information and the website type sent by the server, and outputs the first determination result, the profile information and the website type to the user.
In the embodiment of the present invention, after step 505, the server performs a series of processing after receiving the first URL address, and for this processing, please refer to the first to fourth embodiments for brevity, which is not described again.
In the embodiment of the invention, the safety of the URL address is detected in a cloud (server) loading and processing mode; particularly, the embodiment of the invention provides the content preview of a website or an installation package such as an android installation package (apk) after the two-dimensional code is scanned for a barcode scanning tool such as a smart phone capable of scanning the two-dimensional code, and solves the problem that the content of the two-dimensional code cannot be quickly known from the scanning result when a user scans the two-dimensional code. When a user uses the terminal to scan the two-dimensional code, the terminal sends the decoded URL address or the image information of the undecoded two-dimensional code to the cloud for processing, the detailed information of the URL corresponding to the two-dimensional code is obtained by utilizing the analysis processing capacity of the cloud big data, and the client does not need to access the URL, so that the high-quality experience of safety, rapidness and user flow saving is realized.
Fig. 5-2 is a first schematic interface diagram of a client terminal displayed to a user in the fifth embodiment of the present invention, and as shown in a diagram a in fig. 5-2, the user obtains a first URL address "www.qq.com" by scanning a two-dimensional code, and then sends the first URL address to a server, and the server finds that the website is safe by detection, and therefore returns a first determination result of "website safe", and displays that the website is from the "Tencent network" and has a security level of "passed security monitoring", where the website safe means that the first URL address "www.qq.com" is safe, and prompts the user to "reassure access". After the user clicks 'immediate access', the display is as shown in a b diagram in fig. 5-2, the first URL address is associated with an installation package applying QQ, the installation package is safe, the user can 'download immediately', and the version information of the installation package is displayed on a page of the terminal as 'official version 4.7.2', the size of the QQ installation package is '23.7 Megabits (MB)', the basic introduction of the QQ installation package is 'QQ mobile version', and the perfect mobile social, entertainment and life experience is focused on.
Fig. 5-3 is a second schematic interface diagram of a client terminal displayed to a user in the fifth embodiment of the present invention, and as shown in a diagram a in fig. 5-3, the user obtains a first URL address "www.qq1.com" by scanning a two-dimensional code, and then sends the "www.qq1.com" first URL address to a server, and the server finds that the website is unsafe through detection, and therefore returns a first determination result of the "malicious website danger", and displays that the website is from a Tencent network, and the security level of the website is "high danger"; the danger of the malicious website means that the first URL address ' www.qq1.com ' is unsafe and prompts a user to ' forbid access ', and the details about the danger are ' the website is reported by a large number of users, and the suspicion that the virus Trojan is pretended to be spread in an externally hung website and possibly causes your online bank. After the user clicks the view details, the display is as shown in a b diagram in fig. 5-3, the first URL address is associated with an installation package applying "Camerra 360", wherein "Camerra 360" is the name of the installation package, and further prompts the user that the installation package has been terminated by the virus that infects the stealing number, and the name of the virus is "a.rougu.ku.ku.ai dian360[ recommended secret equiseti ]", and the specific risk details of the installation package are displayed on the page of the terminal as "the virus type spyware", no start icon is used after installation, and the program is automatically started at the background, information such as user short message information, call records and QQ chat records is read, and the information is sent to a designated mailbox in the form of mail, so that the privacy information of the user is seriously leaked. If you confirm that there is no risk with the site, you can choose to submit a complaint. ".
Therefore, a user can acquire detailed information of the two-dimensional code by one key through security scanning of the cloud, the cloud server can return whether the installation package is safe or not for the two-dimensional code corresponding to the installation package, and can return malicious types (such as payment or number stealing risks) and details of the application (such as information of software icons, screenshots, sources, download amount and the like) for malicious applications; whether the two-dimension code corresponding to the common website is safe or not can be returned, malicious types (such as payment and number stealing websites) can be returned for malicious websites, and website information outlines (such as icons, website names and other information) are directly obtained by a user on the premise of ensuring the safety of the user, so that guarantee is provided for the user to safely access the URL corresponding to the two-dimension code.
According to the scheme provided by the embodiment of the invention, one-stop experience is provided for a scene that a user scans the two-dimensional code, the detailed information of the two-dimensional code is obtained before the user accesses the URL corresponding to the two-dimensional code, the quick response is provided, and the safety of the user is guaranteed.
EXAMPLE six
Based on the above, the embodiment of the present invention provides an information processing method, which is applied to an information processing system, where the system includes a server and a client, and the method includes:
step S101, a client detects a first operation of a user;
step S102, the client judges whether the first operation is a bar code scanning operation or not to obtain a second judgment result;
step S103, when the second judgment result shows that the first operation is a bar code scanning operation, the client responds to the first operation and sends a first instruction to an image acquisition unit, and the first instruction is used for triggering the image acquisition unit to start so as to scan a bar code;
step S104, the client receives the image information of the scanned bar code sent by the image acquisition unit;
step S105, the client sends the image information to a server;
step S106, the server receives the image information of the bar code sent by the client;
step S107, the server acquires a first URL address based on the image information, wherein the first URL address is an address associated with the bar code;
step S108, the server judges the safety of the first URL address to obtain a first judgment result;
step S109, the server acquires the summary information and website type of the website linked by the first URL address;
step S1010, the server sends the first judgment result, the synopsis information and the website type to the client;
step S1011, the client receives the first determination result, the website profile information, and the website type sent by the server, and outputs the first determination result, the profile information, and the website type to the user.
In this embodiment, after scanning the barcode, the client acquires the image information of the barcode, but the client does not have the capability of analyzing the image information, and needs to send the image information to the server, and the server receives the image information and obtains the first URL address by analyzing the image information.
Based on the above, the embodiment of the present invention provides an information processing method, which is applied to an information processing system, where the system includes a server and a client, and the method includes:
step S201, a client detects a first operation of a user;
step S202, the client judges whether the first operation is a bar code scanning operation or not to obtain a second judgment result;
step S203, when the second judgment result shows that the first operation is a bar code scanning operation, the client responds to the first operation and sends a first instruction to the image acquisition unit, and the first instruction is used for triggering the image acquisition unit to start so as to scan a bar code;
step S204, a client receives image information of a scanned bar code sent by the image acquisition unit, analyzes the image information to obtain a first Uniform Resource Locator (URL) address, and the first URL address is an address associated with the bar code;
step S205, the client sends the first URL address to the server;
step S206, the server receives the first URL address of the client;
the server judges the safety of the first URL address to obtain a first judgment result;
step S207, the server acquires the synopsis information and the website type of the website linked by the first URL address;
step S208, the server sends the first judgment result, the synopsis information and the website type to the client;
step S209, the client receives the first determination result, the website profile information, and the website type sent by the server, and outputs the first determination result, the profile information, and the website type to the user.
In this embodiment, after scanning the barcode, the client acquires the image information of the barcode, but the client has the capability of analyzing the image information, so that the client itself analyzes the image information to acquire the first URL address, and then sends the first URL address to the server, and the server performs subsequent processing based on the first URL address (step S206 to step S208).
EXAMPLE seven
Based on the foregoing method embodiment, an embodiment of the present invention provides a server, fig. 6 is a schematic structural diagram of a seventh server according to an embodiment of the present invention, and as shown in fig. 6, the server includes a first obtaining unit 601, a first determining unit 602, a second obtaining unit 603, and a first sending unit 604, where:
the first obtaining unit 601 is configured to obtain a first URL address, where the first URL address is an address associated with a barcode interacting with the server;
the first determining unit 602 is configured to determine the security of the first URL address, so as to obtain a first determination result;
the second obtaining unit 603 is configured to obtain the summary information and the website type of the website linked to the first URL address;
the first sending unit 604 is configured to send the first determination result, the synopsis information, and the website type to the client.
Example eight
Based on the seventh embodiment, an embodiment of the present invention provides a server, fig. 7 is a schematic structural diagram of an eighth server according to an embodiment of the present invention, and as shown in fig. 7, the server includes a first obtaining unit 701, a first determining unit 702, a second obtaining unit 703 and a first sending unit 704, where the first determining unit 702 includes a first determining module 721 and a first obtaining module 722, where:
the first obtaining unit 701 is configured to obtain a first URL address, where the first URL address is obtained by scanning a barcode by a client interacting with the server;
the first determining module 721 is configured to determine whether a preset first record records the first URL address, so as to obtain a second determining result;
the first obtaining module 722 is configured to obtain a first determination result from the first record when the second determination result indicates that the first URL address is recorded in the first record;
the second obtaining unit 703 is configured to obtain, from the first record, the summary information and the website type of the website linked to the first URL address;
the first sending unit 704 is configured to send the first determination result, the synopsis information, and the website type to the client.
Example nine
Based on the eighth embodiment, an embodiment of the present invention provides a server, and fig. 8 is a schematic structural diagram of a ninth server according to an embodiment of the present invention, and as shown in fig. 8, the server includes a first obtaining unit 801, a first determining unit 802, a second obtaining unit 803, and a first sending unit 804, where the first determining unit 802 includes a first determining module 821, a capturing module 822, and a second determining module 823, where:
the first obtaining unit 801 is configured to obtain a first URL address, where the first URL address is obtained by scanning a barcode by a client interacting with the server;
the first determining module 821 is configured to determine whether a preset first record records the first URL address, and obtain a second determining result;
the capturing module 822 is configured to, when the second determination result indicates that the first URL address is not recorded in the first record, access the first URL address and capture a first information resource, where the first information resource is an information resource on the first URL address;
the second determining module 823 is configured to determine the security of the first information resource, obtain a third determining result, and use the third determining result as the first determining result;
the second obtaining unit 803 is configured to obtain, from the first information resource, the summary information and the website type of the website linked to the first URL address;
the first sending unit 804 is configured to send the first determination result, the synopsis information, and the website type to the client.
In this embodiment of the present invention, the second determining module includes a first calling sub-module, a first sending sub-module, and a first receiving sub-module, where:
the first calling submodule is used for calling a preset virus scanning module;
the first sending submodule is used for sending the first information resource to a virus scanning module, and the virus scanning module is used for carrying out virus scanning on the information resource;
the first receiving submodule is configured to receive the security result of the first information resource returned by the virus scanning interface, and use the security result of the first information resource as a third determination result.
In this embodiment of the present invention, the second determining module includes a second calling sub-module, a second sending sub-module, a second receiving sub-module, and a first determining sub-module, where:
the second calling sub-module is used for calling a preset website analysis module;
the second sending submodule is used for sending the first information resource to a website analysis module, and the website analysis module is used for comparing the similarity of the first information resource with information resources on other websites;
the second receiving submodule is used for receiving the similarity information returned by the website analysis module;
and the judging submodule is used for judging the safety of the first information resource according to the similarity information and a preset similarity threshold value to obtain a third judging result.
Here, the first determining sub-module is configured to determine a size relationship between the similarity information and the similarity threshold; and when the similarity information is larger than the similarity threshold, obtaining a third judgment result that the first information resource is unsafe.
Here, the first determining sub-module is configured to determine a size relationship between the similarity information and the similarity threshold; and when the similarity information is less than or equal to the similarity threshold, obtaining a third judgment result of the safety of the first information resource.
In this embodiment of the present invention, when the first information resource includes the first application installation package, the second determining module includes a second determining submodule and an obtaining submodule, where:
the second judgment submodule is used for judging the security of the first application installation package to obtain a fourth judgment result;
the obtaining submodule is used for obtaining the application type and the application summary information of the first installation package; and taking the fourth judgment result, the application type of the first installation package and the application summary information as a third judgment result.
In this embodiment of the present invention, the second determining sub-module is configured to analyze the first application installation package to obtain ID information of the first application installation package; judging whether a preset second record records the ID information of the first application installation package or not, and obtaining a second judgment result; when the second judgment result shows that the second record records the ID information of the first application installation package, acquiring the fourth judgment result from the second record;
correspondingly, the obtaining sub-module is configured to obtain the application type and the application summary information of the first installation package from the second record.
Example ten
An embodiment of the present invention provides a server, fig. 9 is a schematic diagram of a composition structure of a ten-server in an embodiment of the present invention, and as shown in fig. 9, the server includes a first obtaining unit 901, a capturing unit 902, a first determining unit 903, a second obtaining unit 904, and a first sending unit 905, where:
the first obtaining unit 901 is configured to obtain a first URL address, where the first URL address is obtained by scanning a barcode by a client that performs interaction with the server;
the fetching unit 902 is configured to fetch a second application installation package based on the first URL address, where the second application installation package is an installation package associated with the barcode;
the first determining unit 903 is configured to determine the security of the second application installation package to obtain a first determination result;
the second obtaining unit 904 is configured to obtain an application type and application profile information of the second installation package;
the first sending unit 905 is configured to send the first determination result, the application type of the second installation package, and the application profile information to the client.
EXAMPLE eleven
An embodiment of the present invention provides a client, fig. 10 is a schematic diagram of a composition structure of an eleventh client according to an embodiment of the present invention, and as shown in fig. 10, the client 1000 includes a detection unit 1001, a second determination unit 1002, a second transmission unit 1003, a first receiving unit 1004, an analysis unit 1005, a third transmission unit 1006, and a third receiving unit 1007, where:
the detection unit 1001 is used for detecting a first operation of a user;
the second judging unit 1002 is configured to judge whether the first operation is a barcode scanning operation, so as to obtain a second judgment result;
the second sending unit 1003 is configured to, when the second determination result indicates that the first operation is a barcode scanning operation, send a first instruction to an image acquisition unit in response to the first operation, where the first instruction is used to trigger the image acquisition unit to start to scan a barcode;
the first receiving unit 1004 is configured to receive the image information of the scanned barcode sent by the image acquisition unit;
the analyzing unit 1005 is configured to analyze the image information to obtain a first URL address, where the first URL address is an address associated with the barcode;
the third sending unit 1006, configured to send the image information to a server;
the second receiving unit 1007 is configured to receive the first determination result, the website profile information, and the website type sent by the server, and output the first determination result, the profile information, and the website type to the user.
Example twelve
An information processing system according to an embodiment of the present invention is provided, fig. 11 is a schematic diagram of a configuration structure of a twelve information processing system according to an embodiment of the present invention, and as shown in fig. 11, the system includes a server 600 and a client 1000, where the client 1000 includes a detection unit 1001, a second judgment unit 1002, a second transmission unit 1003, a first reception unit 1004, an analysis unit 1005, a third transmission unit 1006, and a second reception unit 1007, and the server 600 includes a first acquisition unit 601, a first judgment unit 602, a second acquisition unit 603, and a first transmission unit 604, where:
the detection unit 1001 is used for detecting a first operation of a user;
the second judging unit 1002 is configured to judge whether the first operation is a barcode scanning operation, so as to obtain a second judgment result;
the second sending unit 1003 is configured to, when the second determination result indicates that the first operation is a barcode scanning operation, send a first instruction to an image acquisition unit in response to the first operation, where the first instruction is used to trigger the image acquisition unit to start to scan a barcode;
the first receiving unit 1004 is configured to receive the image information of the scanned barcode sent by the image acquisition unit;
the analyzing unit 1005 is configured to analyze the image information to obtain a first URL address, where the first URL address is an address associated with the barcode;
the second sending unit 1006, configured to send the first URL address;
the first receiving unit 601 is configured to receive the first URL address;
the first determining unit 602 is configured to determine the security of the first URL address, so as to obtain a first determination result;
the first obtaining unit 603 is configured to obtain the summary information and the website type of the website linked to the first URL address;
the first sending unit 604 is configured to send the first determination result, the synopsis information, and the website type;
the third receiving unit 1007 is configured to receive the first determination result, the website profile information, and the website type, and output the first determination result, the profile information, and the website type to a user.
Here, it should be noted that: the above descriptions of the embodiments of the server, the client and the information processing system are similar to the above descriptions of the embodiments of the information processing method applied to the server side, the client side and the information processing system side, and have the same beneficial effects as the method embodiments, and therefore, the descriptions are omitted. For technical details not disclosed in the embodiments of the server, the client and the information processing system of the present invention, please refer to the description of the embodiments of the information processing method of the present invention
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as a removable Memory device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (27)

1. An information processing method, characterized in that the method comprises:
the server scans the bar code based on the client to obtain a first URL address;
the server judges the safety of the first URL address to obtain a first judgment result;
the server acquires the outline information and the website type of the website linked with the first URL address, wherein the outline information at least comprises a website icon, a website name, a website brief description, a security level and risk details; the website types at least comprise social websites, government department websites, transaction websites, enterprise websites, portal websites, interactive game websites, functional websites, office websites and personal websites;
the server sends the first judgment result, the synopsis information and the website type to the client;
the server judges the security of the first URL address to obtain a first judgment result, and the method comprises the following steps: the server judges whether the first URL address is recorded in a preset first record or not, and a second judgment result is obtained; when the second judgment result shows that the first URL address is not recorded in the first record, sending a prompt message to a client, wherein the prompt message is used for showing that the first URL address is being killed, and asking a user to wait; the server carries out virus checking and killing on the first URL address; when the virus is not detected and killed, verifying whether the first URL address is safe or not through similarity to obtain the first judgment result; and when the virus is killed, obtaining a first judgment result that the first URL address is unsafe.
2. The method according to claim 1, wherein the server determines the security of the first URL address, and obtains a first determination result, including:
when the second judgment result shows that the first URL address is recorded in the first record, the server acquires a first judgment result from the first record;
correspondingly, the server acquires the summary information and the website type of the website linked by the first URL address, including:
and the server acquires the outline information and the website type of the website linked by the first URL address from the first record.
3. The method of claim 2, wherein the server determines the security of the first URL address to obtain a first determination result, further comprising:
when the second judgment result shows that the first URL address is not recorded in the first record, the server accesses the first URL address and captures a first information resource, wherein the first information resource is an information resource on the first URL address;
the server judges the security of the first information resource to obtain a third judgment result, and the third judgment result is used as a first judgment result;
correspondingly, the server acquires the summary information and the website type of the website linked by the first URL address, including:
and the server acquires the synopsis information and the website type of the website linked by the first URL address from the first information resource.
4. The method of claim 3, wherein the server determines the security of the first information resource and obtains a third determination result, comprising:
the server calls a preset virus scanning module and sends the first information resource to the virus scanning module, and the virus scanning module is used for scanning the information resource for viruses;
and the server receives the security result of the first information resource returned by the virus scanning module, and takes the security result of the first information resource as a third judgment result.
5. The method of claim 3, wherein the server determines the security of the first information resource and obtains a third determination result, comprising:
the server calls a preset website analysis module and sends the first information resource to the website analysis module, and the website analysis module is used for comparing the similarity of the first information resource with information resources on other websites;
the server receives similarity information returned by the website analysis module;
and the server judges the safety of the first information resource according to the similarity information and a preset similarity threshold value to obtain a third judgment result.
6. The method according to claim 5, wherein the server determines the security of the first information resource according to a magnitude relationship between the similarity information and a preset similarity threshold, and obtains a third determination result, including:
the server judges the magnitude relation between the similarity information and the similarity threshold value;
and when the similarity information is larger than the similarity threshold, obtaining a third judgment result that the first information resource is unsafe.
7. The method according to claim 5, wherein the server determines the security of the first information resource according to a magnitude relationship between the similarity information and a preset similarity threshold, and obtains a third determination result, including:
the server judges the magnitude relation between the similarity information and the similarity threshold value;
and when the similarity information is less than or equal to the similarity threshold, obtaining a third judgment result of the safety of the first information resource.
8. The method according to any one of claims 3 to 7, wherein when the information resource includes a first application installation package, the server determines security of the first information resource to obtain a third determination result, further comprising:
judging the security of the first application installation package to obtain a fourth judgment result;
the server acquires the application type and application summary information of the first application installation package;
and the server takes the fourth judgment result, the application type of the first application installation package and the application summary information as a third judgment result.
9. The method according to claim 8, wherein the determining the security of the first application installation package to obtain a fourth determination result comprises:
the server analyzes the first application installation package to obtain the ID information of the first application installation package;
judging whether a preset second record records the ID information of the first application installation package or not, and obtaining a second judgment result;
when the second judgment result shows that the second record records the ID information of the first application installation package, the server acquires the fourth judgment result from the second record;
correspondingly, the server acquires the application type and the application summary information of the first application installation package, and the method includes:
and the server acquires the application type and the application summary information of the first application installation package from the second record.
10. An information processing method, characterized in that the method comprises:
the server scans the bar code based on the client to obtain a first URL address;
the server captures a second application installation package based on the first URL address, wherein the second application installation package is the installation package associated with the bar code;
the server judges the security of the second application installation package to obtain a first judgment result;
the server acquires the application type and application profile information of the second application installation package, wherein the application profile information at least comprises an application icon, an application name, an application profile, an application version, a security level and risk details;
the server sends the first judgment result, the application type of the second application installation package and the application summary information to the client;
the server judges the security of the second application installation package to obtain a first judgment result, and the method comprises the following steps: the server analyzes the second application installation package to obtain the ID information of the second application installation package; judging whether a preset second record records ID information of the second application installation package or not, and obtaining a second judgment result, wherein the second record is an application blacklist record; and when the second judgment result shows that the second record records the ID information of the second application installation package, the server acquires the first judgment result from the second record.
11. An information processing method, characterized in that the method comprises:
the client detects a first operation of a user;
the client judges whether the first operation is a bar code scanning operation or not to obtain a second judgment result;
when the second judgment result shows that the first operation is a bar code scanning operation, the client responds to the first operation and sends a first instruction to the image acquisition unit, and the first instruction is used for triggering the image acquisition unit to start to scan the bar code;
the client receives image information of a scanned bar code sent by the image acquisition unit, analyzes the image information to obtain a first URL address, and the first URL address is an address associated with the bar code;
the client sends the first URL address to a server;
the client receives a first judgment result, website synopsis information and a website type which are sent by a server, and outputs the first judgment result, the synopsis information and the website type to a user, wherein the synopsis information at least comprises a website icon, a website name, a website brief introduction, a security level and risk details; the website types at least comprise social websites, government department websites, transaction websites, enterprise websites, portal websites, interactive game websites, functional websites, office websites and personal websites; the first judgment result is that the server judges whether the first URL address is recorded in a preset first record or not, and a second judgment result is obtained; when the second judgment result shows that the first URL address is not recorded in the first record, sending a prompt message to a client, wherein the prompt message is used for showing that the first URL address is being checked and killed, asking a user to wait, and performing virus check and killing on the first URL address to obtain the first URL address; when the virus is not detected and killed, verifying whether the first URL address is safe or not through similarity to obtain the first judgment result; and when the virus is killed, obtaining a first judgment result that the first URL address is unsafe.
12. An information processing method, characterized in that the method comprises:
the client detects a first operation of a user;
the client judges whether the first operation is a bar code scanning operation or not to obtain a second judgment result;
when the second judgment result shows that the first operation is a bar code scanning operation, the client responds to the first operation and sends a first instruction to the image acquisition unit, and the first instruction is used for triggering the image acquisition unit to start to scan the bar code;
the client receives image information of a scanned bar code sent by the image acquisition unit, analyzes the image information to obtain a first URL address, and the first URL address is an address associated with the bar code;
the client sends the first URL address to a server;
the server receives the first URL address of the client;
the server judges the safety of the first URL address to obtain a first judgment result;
the server acquires the outline information and the website type of the website linked with the first URL address, wherein the outline information at least comprises a website icon, a website name, a website brief description, a security level and risk details; the website types at least comprise social websites, government department websites, transaction websites, enterprise websites, portal websites, interactive game websites, functional websites, office websites and personal websites;
the server sends the first judgment result, the synopsis information and the website type to the client;
the client receives a first judgment result, website synopsis information and a website type which are sent by a server, and outputs the first judgment result, the synopsis information and the website type to a user;
the server judges the security of the first URL address to obtain a first judgment result, and the method comprises the following steps: the server judges whether the first URL address is recorded in a preset first record or not, and a second judgment result is obtained; when the second judgment result shows that the first URL address is not recorded in the first record, sending a prompt message to a client, wherein the prompt message is used for showing that the first URL address is being killed, and asking a user to wait; the server carries out virus checking and killing on the first URL address; when the virus is not detected and killed, verifying whether the first URL address is safe or not through similarity to obtain the first judgment result; and when the virus is killed, obtaining a first judgment result that the first URL address is unsafe.
13. A server, characterized in that the server comprises a first obtaining unit, a first judging unit, a second obtaining unit and a first sending unit, wherein:
the first acquisition unit is used for acquiring a first URL (uniform resource locator) address based on a bar code scanned by a client, wherein the first URL address is obtained by scanning the bar code by the client;
the first judging unit is used for judging the safety of the first URL address to obtain a first judging result;
the second acquiring unit is configured to acquire the general information and the website type of the website linked to the first URL address, where the general information at least includes a website icon, a website name, a website profile, a security level, and a risk detail; the website types at least comprise social websites, government department websites, transaction websites, enterprise websites, portal websites, interactive game websites, functional websites, office websites and personal websites;
the first sending unit is configured to send the first determination result, the synopsis information, and the website type to the client;
the first judging unit is further configured to judge whether the first URL address is recorded in a preset first record, and obtain a second judgment result; when the second judgment result shows that the first URL address is not recorded in the first record, sending a prompt message to a client, wherein the prompt message is used for showing that the first URL address is being killed, and asking a user to wait; virus checking and killing is carried out on the first URL address; when the virus is not detected and killed, verifying whether the first URL address is safe or not through similarity to obtain the first judgment result; and when the virus is killed, obtaining a first judgment result that the first URL address is unsafe.
14. The server according to claim 13, wherein the first judging unit includes a first judging module and a first obtaining module, and wherein:
the first judging module is used for judging whether a first URL address is recorded in a preset first record or not and obtaining a second judging result;
the first obtaining module is configured to obtain a first determination result from the first record when the second determination result indicates that the first URL address is recorded in the first record;
correspondingly, the second obtaining unit is configured to obtain, from the first record, the summary information and the website type of the website linked to the first URL address.
15. The server according to claim 14, wherein the first determining unit further includes: snatch module and second judgement module, wherein:
the capturing module is configured to, when the second determination result indicates that the first URL address is not recorded in the first record, access the first URL address and capture a first information resource, where the first information resource is an information resource on the first URL address;
the second judgment module is used for judging the security of the first information resource to obtain a third judgment result, and the third judgment result is used as a first judgment result;
correspondingly, the second obtaining unit is configured to obtain the general information and the website type of the website linked by the first URL address from the first information resource.
16. The server according to claim 15, wherein the second determining module comprises a first calling sub-module, a first sending sub-module and a first receiving sub-module, wherein:
the first calling submodule is used for calling a preset virus scanning module;
the first sending submodule is used for sending the first information resource to a virus scanning module, and the virus scanning module is used for carrying out virus scanning on the information resource;
the first receiving submodule is configured to receive the security result of the first information resource returned by the virus scanning interface, and use the security result of the first information resource as a third determination result.
17. The server according to claim 15, wherein the second determining module comprises a second calling sub-module, a second sending sub-module, a second receiving sub-module and a first determining sub-module, wherein:
the second calling sub-module is used for calling a preset website analysis module;
the second sending submodule is used for sending the first information resource to a website analysis module, and the website analysis module is used for comparing the similarity of the first information resource with information resources on other websites;
the second receiving submodule is used for receiving the similarity information returned by the website analysis module;
and the judging submodule is used for judging the safety of the first information resource according to the similarity information and a preset similarity threshold value to obtain a third judging result.
18. The server according to claim 17, wherein the first determining sub-module is configured to determine a size relationship between the similarity information and the similarity threshold; and when the similarity information is larger than the similarity threshold, obtaining a third judgment result that the first information resource is unsafe.
19. The server according to claim 17, wherein the first determining sub-module is configured to determine a size relationship between the similarity information and the similarity threshold; and when the similarity information is less than or equal to the similarity threshold, obtaining a third judgment result of the safety of the first information resource.
20. The server according to any one of claims 15 to 19, wherein when the first information resource includes a first application installation package, the second determining module includes a second determining submodule and an obtaining submodule, where:
the second judgment submodule is used for judging the security of the first application installation package to obtain a fourth judgment result;
the obtaining submodule is used for obtaining the application type and the application summary information of the first application installation package; and taking the fourth judgment result, the application type of the first application installation package and the application summary information as a third judgment result.
21. The server according to claim 20, wherein the second determining sub-module is configured to parse the first application installation package to obtain ID information of the first application installation package; judging whether a preset second record records the ID information of the first application installation package or not, and obtaining a second judgment result; when the second judgment result shows that the second record records the ID information of the first application installation package, acquiring the fourth judgment result from the second record;
correspondingly, the obtaining sub-module is configured to obtain the application type and the application summary information of the first application installation package from the second record.
22. A server is characterized by comprising a first acquisition unit, a grabbing unit, a first judgment unit, a second acquisition unit and a first sending unit, wherein:
the first acquisition unit is used for acquiring a first URL (uniform resource locator) address based on a bar code scanned by a client, wherein the first URL address is obtained by scanning the bar code by the client;
the capturing unit is used for capturing a second application installation package based on the first URL address, wherein the second application installation package is an installation package associated with the bar code;
the first judging unit is used for judging the security of the second application installation package to obtain a first judging result;
the second obtaining unit is configured to obtain an application type and application profile information of the second application installation package, where the application profile information at least includes an application icon, an application name, an application profile, an application version, a security level, and risk details;
the first sending unit is configured to send the first determination result, the application type of the second application installation package, and the application profile information to the client;
the first judging unit is further configured to analyze the second application installation package to obtain ID information of the second application installation package; judging whether a preset second record records ID information of the second application installation package or not, and obtaining a second judgment result, wherein the second record is an application blacklist record; and when the second judgment result shows that the second record records the ID information of the second application installation package, the server acquires the first judgment result from the second record.
23. A client is characterized by comprising a detection unit, a second judgment unit, a second sending unit, a first receiving unit, an analysis unit, a third sending unit and a second receiving unit, wherein:
the detection unit is used for detecting a first operation of a user;
the second judging unit is used for judging whether the first operation is a bar code scanning operation or not to obtain a second judging result;
the second sending unit is configured to send a first instruction to the image acquisition unit in response to the first operation when the second determination result indicates that the first operation is a barcode scanning operation, where the first instruction is used to trigger the image acquisition unit to start to scan a barcode;
the first receiving unit is used for receiving the image information of the scanned bar code sent by the image acquisition unit;
the analysis unit is used for analyzing the image information to obtain a first URL address, and the first URL address is an address associated with the bar code;
the third sending unit is used for sending the first URL address to a server;
the second receiving unit is configured to receive a first determination result, website profile information, and a website type sent by a server, and output the first determination result, the profile information, and the website type to a user, where the profile information at least includes a website icon, a website name, a website profile, a security level, and risk details; the website types at least comprise social websites, government department websites, transaction websites, enterprise websites, portal websites, interactive game websites, functional websites, office websites and personal websites; the first judgment result is that the server judges whether the first URL address is recorded in a preset first record or not, and a second judgment result is obtained; when the second judgment result shows that the first URL address is not recorded in the first record, sending a prompt message to a client, wherein the prompt message is used for showing that the first URL address is being checked and killed, asking a user to wait, and performing virus check and killing on the first URL address to obtain the first URL address; when the virus is not detected and killed, verifying whether the first URL address is safe or not through similarity to obtain the first judgment result; and when the virus is killed, obtaining a first judgment result that the first URL address is unsafe.
24. An information processing system, characterized in that the system comprises a server and a client, wherein the client comprises a detection unit, a second judgment unit, a second sending unit, a first receiving unit, an analysis unit, a third sending unit and a second receiving unit, the server comprises a first obtaining unit, a first judgment unit, a second obtaining unit and a first sending unit, wherein:
the detection unit is used for detecting a first operation of a user;
the second judging unit is used for judging whether the first operation is a bar code scanning operation or not to obtain a second judging result;
the second sending unit is configured to send a first instruction to the image acquisition unit in response to the first operation when the second determination result indicates that the first operation is a barcode scanning operation, where the first instruction is used to trigger the image acquisition unit to start to scan a barcode;
the first receiving unit is used for receiving the image information of the scanned bar code sent by the image acquisition unit;
the analysis unit is used for analyzing the image information to obtain a first URL address, and the first URL address is an address associated with the bar code;
the third sending unit is configured to send the first URL address;
the first acquisition unit is used for receiving the first URL address;
the first judging unit is used for judging the safety of the first URL address to obtain a first judging result;
the second acquiring unit is configured to acquire the general information and the website type of the website linked to the first URL address, where the general information at least includes a website icon, a website name, a website profile, a security level, and a risk detail; the website types at least comprise social websites, government department websites, transaction websites, enterprise websites, portal websites, interactive game websites, functional websites, office websites and personal websites;
the first sending unit is used for sending the first judgment result, the synopsis information and the website type;
the second receiving unit is configured to receive the first determination result, the website profile information, and the website type, and output the first determination result, the profile information, and the website type to a user;
the first judging unit is further configured to judge whether the first URL address is recorded in a preset first record, and obtain a second judgment result; when the second judgment result shows that the first URL address is not recorded in the first record, sending a prompt message to a client, wherein the prompt message is used for showing that the first URL address is being checked and killed, asking a user to wait, and performing virus checking and killing on the first URL address; when the virus is not detected and killed, verifying whether the first URL address is safe or not through similarity to obtain the first judgment result; and when the virus is killed, obtaining a first judgment result that the first URL address is unsafe.
25. A client, comprising:
a memory for storing executable instructions;
a processor for implementing the method of any one of claims 1 to 9, or claim 10, when executing executable instructions stored in the memory.
26. A server, comprising:
a memory for storing executable instructions;
a processor, configured to execute the executable instructions stored in the memory, to implement the method of claim 11.
27. A computer-readable storage medium having stored thereon executable instructions for causing a processor to perform the method of any one of claims 1 to 9, or claim 10, or claim 11 when executed.
CN201410453286.9A 2014-09-04 2014-09-04 Information processing method and system, server and client Active CN105391674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410453286.9A CN105391674B (en) 2014-09-04 2014-09-04 Information processing method and system, server and client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410453286.9A CN105391674B (en) 2014-09-04 2014-09-04 Information processing method and system, server and client

Publications (2)

Publication Number Publication Date
CN105391674A CN105391674A (en) 2016-03-09
CN105391674B true CN105391674B (en) 2020-10-16

Family

ID=55423515

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410453286.9A Active CN105391674B (en) 2014-09-04 2014-09-04 Information processing method and system, server and client

Country Status (1)

Country Link
CN (1) CN105391674B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106992975B (en) * 2017-03-21 2021-01-12 腾讯科技(深圳)有限公司 Malicious website identification method and device
CN107239534B (en) * 2017-05-31 2020-06-30 Oppo广东移动通信有限公司 Bar code scanning method, bar code scanning device, mobile terminal and computer readable storage medium
CN107516042B (en) * 2017-09-02 2021-04-20 刘兴丹 Method, device and system for previewing two-dimensional code and website link screenshot
CN107704790A (en) * 2017-10-10 2018-02-16 徐高超 A kind of method and system based on the checking of two-dimensional code scanning safety detection
CN108234484B (en) * 2017-12-30 2021-01-19 广东世纪网通信设备股份有限公司 Computer readable storage medium for tracing Trojan horse source and Trojan horse source tracing system applying same
CN109271779A (en) * 2018-10-24 2019-01-25 维沃移动通信有限公司 A kind of installation packet inspection method, terminal device and server
CN109241487A (en) * 2018-11-30 2019-01-18 武汉易刊科技有限责任公司 A kind of online service method and device based on periodical
CN110046687A (en) * 2019-03-01 2019-07-23 阿里巴巴集团控股有限公司 Bar code methods of exhibiting, equipment and device
CN110636114B (en) * 2019-08-23 2022-03-18 四川汇安融信息技术股份有限公司 Customer service access method, access system, service system and cloud platform
CN110827041A (en) * 2019-11-04 2020-02-21 广州布珞科技有限公司 Anti-counterfeiting tracing method, system, medium and equipment
CN113660274B (en) * 2021-08-18 2023-04-07 中国电信股份有限公司 Website information processing method and device, storage medium and electronic equipment
CN116566739B (en) * 2023-06-29 2023-09-15 北京安天网络安全技术有限公司 Security detection system, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102082792A (en) * 2010-12-31 2011-06-01 成都市华为赛门铁克科技有限公司 Phishing webpage detection method and device
CN102664987A (en) * 2012-03-23 2012-09-12 叶明� Mobile-phone two-dimensional-code based method for warning before using mobile-phone two-dimensional-code to scan and link website
CN103984697A (en) * 2014-04-08 2014-08-13 百度在线网络技术(北京)有限公司 Barcode information processing method, device and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9083531B2 (en) * 2012-10-16 2015-07-14 Symantec Corporation Performing client authentication using certificate store on mobile device
CN103166972A (en) * 2013-03-25 2013-06-19 北京奇虎科技有限公司 Safety website access system, and equipment and method for same

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102082792A (en) * 2010-12-31 2011-06-01 成都市华为赛门铁克科技有限公司 Phishing webpage detection method and device
CN102664987A (en) * 2012-03-23 2012-09-12 叶明� Mobile-phone two-dimensional-code based method for warning before using mobile-phone two-dimensional-code to scan and link website
CN103984697A (en) * 2014-04-08 2014-08-13 百度在线网络技术(北京)有限公司 Barcode information processing method, device and system

Also Published As

Publication number Publication date
CN105391674A (en) 2016-03-09

Similar Documents

Publication Publication Date Title
CN105391674B (en) Information processing method and system, server and client
US9900337B2 (en) Selective website vulnerability and infection testing
AU2022204197B2 (en) Security weakness and infiltration detection and repair in obfuscated website content
US8385589B2 (en) Web-based content detection in images, extraction and recognition
JP7025354B2 (en) Automation of image validation
CN110035075A (en) Detection method, device, computer equipment and the storage medium of fishing website
WO2019067993A1 (en) Phishing attack detection
KR101554518B1 (en) Information obtaining method and apparatus
US20180295178A1 (en) Information sharing method and system
CN113489713B (en) Network attack detection method, device, equipment and storage medium
US9916486B2 (en) Method and apparatus for mobile terminal to process visual graphics code
CN106713579B (en) Telephone number identification method and device
JP2005174317A5 (en)
CN103685307A (en) Method, system, client and server for detecting phishing fraud webpage based on feature library
CN107800686B (en) Phishing website identification method and device
CN111245838B (en) Method for protecting key information by anti-crawler
CN104143008A (en) Method and device for detecting phishing webpage based on picture matching
CN105122760A (en) Page operation processing method, device and terminal
CN104200252B (en) A kind of function logic jump method, client and system based on barcode data
CN116366338B (en) Risk website identification method and device, computer equipment and storage medium
US9665574B1 (en) Automatically scraping and adding contact information
CN108270754B (en) Detection method and device for phishing website
CN111314326B (en) Method, device, equipment and medium for confirming HTTP vulnerability scanning host
US8464343B1 (en) Systems and methods for providing security information about quick response codes
CN112347457A (en) Abnormal account detection method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant